CA3089745C - Secure storage of data and hashes via a distributed ledger system - Google Patents

Secure storage of data and hashes via a distributed ledger system Download PDF

Info

Publication number
CA3089745C
CA3089745C CA3089745A CA3089745A CA3089745C CA 3089745 C CA3089745 C CA 3089745C CA 3089745 A CA3089745 A CA 3089745A CA 3089745 A CA3089745 A CA 3089745A CA 3089745 C CA3089745 C CA 3089745C
Authority
CA
Canada
Prior art keywords
data
files
key
devices
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA3089745A
Other languages
English (en)
French (fr)
Other versions
CA3089745A1 (en
Inventor
Dejan Nenov
Roumen Kassabov
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fortress Cyber Security LLC
Original Assignee
Fortress Cyber Security LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/880,209 external-priority patent/US10181948B1/en
Priority claimed from US15/880,193 external-priority patent/US10291395B1/en
Application filed by Fortress Cyber Security LLC filed Critical Fortress Cyber Security LLC
Priority to CA3207982A priority Critical patent/CA3207982A1/en
Publication of CA3089745A1 publication Critical patent/CA3089745A1/en
Application granted granted Critical
Publication of CA3089745C publication Critical patent/CA3089745C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0655Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed centrally
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/306Payment architectures, schemes or protocols characterised by the use of specific devices or networks using TV related infrastructures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/308Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/321Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Virology (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Multi Processors (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
CA3089745A 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system Active CA3089745C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3207982A CA3207982A1 (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US15/880,209 2018-01-25
US15/880,193 2018-01-25
US15/880,209 US10181948B1 (en) 2018-01-25 2018-01-25 Secure storage of hashes within a distributed ledger
US15/880,193 US10291395B1 (en) 2018-01-25 2018-01-25 Secure storage of data via a distributed ledger system
PCT/US2019/015305 WO2019148050A1 (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CA3207982A Division CA3207982A1 (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system

Publications (2)

Publication Number Publication Date
CA3089745A1 CA3089745A1 (en) 2019-08-01
CA3089745C true CA3089745C (en) 2023-09-26

Family

ID=65494504

Family Applications (2)

Application Number Title Priority Date Filing Date
CA3089745A Active CA3089745C (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system
CA3207982A Pending CA3207982A1 (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA3207982A Pending CA3207982A1 (en) 2018-01-25 2019-01-25 Secure storage of data and hashes via a distributed ledger system

Country Status (3)

Country Link
EP (2) EP4131033A1 (de)
CA (2) CA3089745C (de)
WO (1) WO2019148050A1 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535938B (zh) 2019-08-29 2021-07-27 腾讯科技(深圳)有限公司 一种基于智能合约的数据处理方法、设备及存储介质
JP7376695B2 (ja) * 2019-10-09 2023-11-08 トヨタ モーター ノース アメリカ,インコーポレイティド 輸送装置ソフトウェアアップデートの管理
DE102020201283A1 (de) * 2020-02-03 2021-08-05 Deere & Company Verfahren zur Überprüfung einer emittierten Stoffmenge
CN112947967B (zh) * 2021-03-08 2023-09-26 中国联合网络通信集团有限公司 软件更新方法、区块链应用商店及软件上传终端
US12388812B2 (en) * 2023-08-31 2025-08-12 Dell Products L.P. Distribution of data in clusters of devices

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017069874A1 (en) * 2015-10-21 2017-04-27 Manifold Technology, Inc. Event synchronization systems and methods
US20170134162A1 (en) * 2015-11-10 2017-05-11 Shannon Code System and process for verifying digital media content authenticity
EP3380984A4 (de) * 2015-11-24 2019-07-31 Ben-Ari, Adi System und verfahren zum schutz von daten durch intelligenten blockchain-vertrag
US10063529B2 (en) * 2016-03-28 2018-08-28 Accenture Global Solutions Limited Secure 3D model sharing using distributed ledger
GB201609450D0 (en) * 2016-05-27 2016-07-13 Chain Of Things Ltd Device security chain of proof
KR20170137388A (ko) * 2016-06-03 2017-12-13 (주) 블록체인오에스 블록체인 기술을 이용한 무결성 보장 방법

Also Published As

Publication number Publication date
CA3207982A1 (en) 2019-08-01
EP4131033A1 (de) 2023-02-08
EP3743835B1 (de) 2022-09-28
EP3743835A1 (de) 2020-12-02
CA3089745A1 (en) 2019-08-01
WO2019148050A1 (en) 2019-08-01

Similar Documents

Publication Publication Date Title
US12335367B2 (en) Secure storage of data via a distributed ledger system
US10735184B2 (en) Secure storage of hashes within a distributed ledger
US12323450B2 (en) Systems and methods for detection and mitigation of malicious encryption
US20240098097A1 (en) Secure over-the-air updates
US8966249B2 (en) Data security and integrity by remote attestation
CA3089745C (en) Secure storage of data and hashes via a distributed ledger system
US10050982B1 (en) Systems and methods for reverse-engineering malware protocols
CN107003815B (zh) 云环境中机密数据的自动化管理
US9124640B2 (en) Systems and methods for implementing computer security
US11539750B2 (en) Systems and methods for network security memory reduction via distributed rulesets
US9690598B2 (en) Remotely establishing device platform integrity
CN108780485A (zh) 基于模式匹配的数据集提取
US20200266971A1 (en) Re-encrypting data on a hash chain
CN114041132B (zh) 执行环境和网守布置
US10635826B2 (en) System and method for securing data in a storage medium
WO2015183698A1 (en) Method and system for implementing data security policies using database classification
Gunadham et al. Security concerns in cloud computing for knowledge management systems
CN117667301A (zh) 保护容器生态系统
US10958666B1 (en) Systems and methods for verifying connection integrity
CN120320984B (zh) 一种外部设备认证方法、装置、电子设备及存储介质
Hossain et al. Measuring Interpretation and Evaluation of Client-side Encryption Tools in Cloud Computing
WO2017019551A1 (en) Systems and methods for providing multi-level network security

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20200727

MPN Maintenance fee for patent paid

Free format text: FEE DESCRIPTION TEXT: MF (PATENT, 6TH ANNIV.) - SMALL

Year of fee payment: 6

U00 Fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED

Effective date: 20250120

U11 Full renewal or maintenance fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT DETERMINED COMPLIANT

Effective date: 20250121